
eDJ Summary
eDJ Analyst summaries are only published for providers who have completed the eDJ Reviewed
briefing process to validate the features and status of the profile. Use the 'Request More Info' button to get product information and request
that they become eDJ Reviewed. Participating and Premium members can access analyst offering perspectives through scheduled inquiry calls.
Analyst Last Briefed:
Over 6 months ago.
Differentiator
Topic: DESCRIPTION Date: 2013-09-16 12:15:18 Premium Members OnlyThis eDJ Note is limited to Premium Members
Challenge
Topic: Review-TAR Conceptual Date: 2013-09-16 12:11:32You must register and log in to read public eDJ Notes
Summary
Topic: Review-TAR-Clustered Date: 2013-09-16 11:52:09You must register and log in to read public eDJ Notes
Summary
Topic: Market-Law Firm Date: 2013-09-16 11:50:35
Summary
Topic: Search-Indexed Date: 2013-09-16 11:49:36You must register and log in to read public eDJ Notes
Summary
Topic: Collection-Enterprise ESI Date: 2013-09-16 11:49:09You must register and log in to read public eDJ Notes
Delivery Method:
- Method-Software/Inhouse
- Method-Cloud/Hosted/SaaS
Markets:
- Market-Corporate Enterprise
- Market-Law Firm
- Market-Government
- Market-Provider
- Market-International
- Market-Small Mid Sized Business
Architecture:
- System-Chain of Custody
- System-Audit Log
- Report-Customizable
- System-Security Roles
- System-Administration-Remote
- Architecture-Server-Virtual
- System-Scheduled Tasks
- System-Alerts
- Architecture-Desktop Software
- Architecture-Server-Enterprise Client
- Architecture-Server-Linux
- Architecture-Server-Enterprise Web
- Architecture-Server-Saas Hosted
- Architecture-Cloud
- Architecture-64-bit Compatible
- Architecture-API-Open
- Architecture-Open Source Components
- Architecture-Distributed
- Architecture-Windows Server
- Architecture-Apple Server
- Architecture-GUI-Web
- System-Print
- System-GUI-Multilingual
- Architecture-Security-Physical
- System-Processed ESI Required
- Architecture-Desktop-Mac OS
- System-Integration-Enterprise Systems
- System-Track-Activity
- System-Multimatter
- System-Alerts-Automated
General Coverage:
- General-Information Governance
- General-Identification Investigation
- General-Preservation Holds
- General-Collection Search
- General-Processing ECA
- General-Review
- General-Analysis
- General-Production
- General-Presentation
Manage:
- Management-Incident Response
- Management-Project Workflow
- Management-Review-Team
- Management-Policy - Privacy
- Management-Quality Control-Automated
- Management-Quality Control-Metrics Reporting
- Management-Documents
- Management-Policy
- Management-Policy-International
- Management-Infrastructure
Information Governance:
- Management - Policy - Retention
- IG-End Point Protection
- IG-Classification
- IG-Migration
- IG-Archiving-Rule Designation
Analyze:
- Identify-Data Map
- Identify-User Map
- Analysis-ESI Sampling
- Analysis-Linguistic
- Analysis-Domain
- Analysis-Social Networking
- Analysis-Chronological
- Analysis-Near Duplicate-OCR
- Analysis-Custodian Identity
- Analysis-Visualization
- Analysis-Image Categorization
- Analysis-Dashboard
- Analysis-Conceptual
- Analysis-Similarity
- Analysis-Cluster-Soft
- Analysis-Context
- Analysis-Event Map
- Process-Autocode-Subjective
- Analysis-Machine Learning
- Analysis-Profile-ESI
- Analysis-Pattern-Time
Preserve:
- Preserve-Legal Hold Notices
- Preserve-ESI Preservation Repository
- Preserve-In Place
- Preserve-In Place-Non Rights Based
- Preserve-Stealth Hold Collection
- Preserve-Legal Hold Notifications - Iterative
Collect:
- Collection-Forensically Sound Copy
- Identify-Stealth Investigation
- Collection-Enterprise ESI
- Collection-Incremental
- Collection-Remote
- Collection-Local
Search:
- Search-Indexed
- Search-Crawl
- Search-Concept
- Search-Network Enterprise
- Search-Fuzzy Logic
- Search-Foreign Language
- Search-Regular Expression
- Search-Facet Navigation
- Search-Synonym Expansion
- Report-Hit Report
- Search-Stemming
- Search-Saved Queries
- Search-Proximity
- Search-Boolean
- Search-Federated Sources
- Search-Index-Weighted
- Search-Wildcard
- Search-Pattern Expansion
- Search-Natural Language
Purchase Method:
- Enterprise License ($ per seat)
- Subscription ($ per Year)
Process:
- Process-Inventory
- Process-Legacy Media-Tape
- Process-Non-text File Detection
- Process-Metadata Extraction
- Process-File Type Identification
- Process-TIFF Image Conversion
- Process-Text Extraction
- Process-Autocode-Objective
- Process-Load Files
- Process-Exception Resolution
- Process-Deduplication-Hash
- Process-Communication De-Duplication
- Process-De-NIST Culling
- Process-Culling-Metadata
- Process-Cull-Rules
- Process-Content Flagging Rules
- Process-Near Duplicate ESI
- Process-Deduplication-Email Thread
- Process-Foreign Language Identification
- Process-Custom Hash Filter
Produce:
- Produce-Native ESI
- Produce-Load File-Delimited
- Produce-Cloud Delivery
- Produce-Secure FTP
ESI Sources:
- ESI-Audio
- ESI-Backup-Tapes
- ESI-Communication
- ESI-Communication-Exchange and PST
- ESI-Communication-Freemail
- ESI-Communication-Lotus Domino
- ESI-Communication-Novell Groupwise
- ESI-Container Files
- ESI-Encoding
- ESI-Flash Drives-Memory Cards
- ESI-Floppy Disks-Other Legacy Formats
- ESI-Graphics
- ESI-Graphics-CAD
- ESI-Graphics-PDF
- ESI-Graphics-TIFF
- ESI-Hard Copy Documents
- ESI-Hard Drives
- ESI-Markup Language Files
- ESI-Mobile Devices
- ESI-Mobile Devices-iPad
- ESI-Mobile Devices-iPhone
- ESI-Office Files
- ESI-Office Files-2007+ format
- ESI-Optical Media
- ESI-Residual Data
- ESI-Source Code
- ESI-System Data
- ESI-Video
- ESI-Cloud
- ESI-Content Management-Sharepoint
- ESI-Network Servers
- ESI-Network Storage
- ESI-Personal Computers
- ESI-Personal Computers-Apple Mac
- ESI-Mobile Devices-Android
- ESI-3rd Party Hosted
- ESI-Cloud-Communications